摘要:
The present invention provides an apparatus for producing a mass-coded combinatorial library comprising a set of compounds having the general formula X(Y)n, where X is a scaffold, each Y is, independently, a peripheral moiety, and n is an integer greater than 1. The apparatus comprises a digital processor assembly for selecting a peripheral moiety precursor subset from a peripheral moiety precursor set. The subset includes a sufficient number of peripheral moiety precursors that at least about 50 distinct combinations of n peripheral moieties derived from the peripheral moiety precursors in the subset exist. The subset of peripheral moiety precursors is selected so that at least about 90% of all possible combinations of n peripheral moieties derived from the subset have a molecular mass sum which is distinct from the molecular mass sums of all of the other combinations of n peripheral moieties. Methods of use of the mass-coded combinatorial library produced by this apparatus are also disclosed.
摘要:
The present invention provides a method for identifying a member of a mass-coded combinatorial library which is a ligand for biomolecule and assessing the effect of the binding of the ligand to the biomolecule. The mass-coded molecular library comprises compounds of the general formula XYn, wherein n is an integer from 2 to about 6, X is a scaffold and each Y is, independently, a peripheral moiety. The mass-coded combinatorial library is produced by reacting a scaffold precursor with a sufficient number of distant peripheral moiety precursors such that there exist at least about 250 distinct combinations of n peripheral moieties derived from the peripheral moiety precursors.
摘要:
The present invention provides a method for producing a mass-coded combinatorial library comprising a set of compounds having the general formula X(Y)n, where X is a scaffold, each Y is, independently, a peripheral moiety, and n is an integer greater than 1. The method comprises selecting a peripheral moiety precursor subset from a peripheral moiety precursor set. The subset includes a sufficient number of peripheral moiety precursors that at least about 50 distinct combinations of n peripheral moieties derived from the peripheral moiety precursors in the subset exist. The subset of peripheral moiety precursors is selected so that at least about 90% of all possible combinations of n peripheral moieties derived from the subset have a molecular mass sum which is distinct from the molecular mass sums of all of the other combinations of n peripheral moieties. The method further comprises contacting the peripheral moiety precursor subset with a scaffold precursor which has n reactive groups. Methods of use of the mass-coded combinatorial library produced by this method for identifying a ligand to a particular biomolecule are also disclosed.
摘要:
The present invention provides a method for producing a mass-coded combinatorial library comprising a set of compounds having the general formula X(Y)n, where X is a scaffold, each Y is, independently, a peripheral moiety, and n is an integer greater than 1. The method comprises selecting a peripheral moiety precursor subset from a peripheral moiety precursor set. The subset includes a sufficient number of peripheral moiety precursors that at least about 50 distinct combinations of n peripheral moieties derived from the peripheral moiety precursors in the subset exist. The subset of peripheral moiety precursors is selected so that at least about 90% of all possible combinations of n peripheral moieties derived from the subset have a molecular mass sum which is distinct from the molecular mass sums of all of the other combinations of n peripheral moieties. The method further comprises contacting the peripheral moiety precursor subset with a scaffold precursor which has n reactive groups. Methods of use of the mass-coded combinatorial library produced by this method for identifying a ligand to a particular biomolecule are also disclosed.
摘要:
The present invention provides a method for producing a mass-coded combinatorial library comprising a set of compounds having the general formula X(Y)n, where X is a scaffold, each Y is, independently, a peripheral moiety, and n is an integer greater than 1. The method comprises selecting a peripheral moiety precursor subset from a peripheral moiety precursor set. The subset includes a sufficient number of peripheral moiety precursors that at least about 50 distinct combinations of n peripheral moieties derived from the peripheral moiety precursors in the subset exist. The subset of peripheral moiety precursors is selected so that at least about 90% of all possible combinations of n peripheral moieties derived from the subset have a molecular mass sum which is distinct from the molecular mass sums of all of the other combinations of n peripheral moieties. The method further comprises contacting the peripheral moiety precursor subset with a scaffold precursor which has n reactive groups. Methods of use of the mass-coded combinatorial library produced by this method for identifying a ligand to a particular biomolecule are also disclosed.
摘要:
A data processing application logging, recording, and reporting process and infrastructure. Compliance with regulatory directives such as HIPAA, internal organizational and corporate, personal information privacy, and other security policies can thus be enforced without the need to recode legacy application software. In one preferred embodiment, a core agent process provides “listener” functionality that captures user input events, such as keyboard and mouse interactions, between a user and a legacy application of interest. The agent obtains instructions for how to deal with such events, accessing information that describes the application's behavior as already captured by an application profiler tool. Keyboard and mouse data entry sequences, screen controls and fields of interest are tagged during application profiling process. This data is stored in application profile developed for each mode of a legacy application. The technique can be implemented in various Information Technology (IT) environments including mainframe/terminal applications and/or client/server applications. Thus, full coverage of “fat” client, “thin” client, and legacy “mainframe” applications can be provided with a common approach across an enterprise.
摘要:
A technique for establishing usage control over digital assets such as computer files. The system model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when policy violations occur.